EA200400058A1 - Способ защиты программы от её неавторизованного использования при помощи так называемого принципа детектирования и принуждения - Google Patents
Способ защиты программы от её неавторизованного использования при помощи так называемого принципа детектирования и принужденияInfo
- Publication number
- EA200400058A1 EA200400058A1 EA200400058A EA200400058A EA200400058A1 EA 200400058 A1 EA200400058 A1 EA 200400058A1 EA 200400058 A EA200400058 A EA 200400058A EA 200400058 A EA200400058 A EA 200400058A EA 200400058 A1 EA200400058 A1 EA 200400058A1
- Authority
- EA
- Eurasian Patent Office
- Prior art keywords
- program
- unauthorized use
- protecting
- criterion
- characteristic
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract 3
- PWPJGUXAGUPAHP-UHFFFAOYSA-N lufenuron Chemical compound C1=C(Cl)C(OC(F)(F)C(C(F)(F)F)F)=CC(Cl)=C1NC(=O)NC(=O)C1=C(F)C=CC=C1F PWPJGUXAGUPAHP-UHFFFAOYSA-N 0.000 title 1
- 238000001514 detection method Methods 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Remote Sensing (AREA)
- Radar, Positioning & Navigation (AREA)
- Storage Device Security (AREA)
- Debugging And Monitoring (AREA)
- Preparing Plates And Mask In Photomechanical Process (AREA)
- Stored Programmes (AREA)
Abstract
Предметом настоящего изобретения является способ защиты от неавторизованного использования уязвимой программы (которая функционирует в системе обработки данных) с использованием по меньшей мере одного устройства защиты. Способ состоит в том, чтобы определить по меньшей мере одну характеристику выполнения программы, которая может быть проконтролирована, по меньшей мере частично, в некотором устройстве; по меньшей мере один критерий, который должен выполняться, по меньшей мере, для одной характеристики выполнения программы; средства детектирования, которые следует применить в устройстве и которые позволяют обнаружить, что по меньшей мере одна характеристика выполнения программы не удовлетворяет по меньшей мере одному соответствующему критерию; и средства принуждения, которые следует применить в устройстве и которые позволяют проинформировать систему обработки данных и/или модифицировать ход выполнения программы, если хотя бы один критерий не соблюдается.Отчет о международном поиске был опубликован 2004.01.22.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0110244A FR2828301B1 (fr) | 2001-07-31 | 2001-07-31 | Procede pour proteger un logiciel a l'aide d'un principe dit de "detection et coercition" contre son utilisation non autorisee |
PCT/FR2002/002343 WO2003012571A2 (fr) | 2001-07-31 | 2002-07-04 | Procede pour proteger un logiciel a l'aide de 'detection et coercition' contre son utilisation non autorisee |
Publications (2)
Publication Number | Publication Date |
---|---|
EA200400058A1 true EA200400058A1 (ru) | 2004-06-24 |
EA005466B1 EA005466B1 (ru) | 2005-02-24 |
Family
ID=8866119
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EA200400058A EA005466B1 (ru) | 2001-07-31 | 2002-07-04 | Способ защиты программы от её неавторизованного использования при помощи так называемого принципа детектирования и принуждения |
Country Status (29)
Country | Link |
---|---|
EP (1) | EP1412838B1 (ru) |
JP (1) | JP3949104B2 (ru) |
KR (1) | KR100881733B1 (ru) |
CN (1) | CN100339778C (ru) |
AP (1) | AP2055A (ru) |
AU (1) | AU2002328377B2 (ru) |
BR (1) | BR0211373A (ru) |
CA (1) | CA2455626A1 (ru) |
CO (1) | CO5550507A2 (ru) |
EA (1) | EA005466B1 (ru) |
EC (1) | ECSP044952A (ru) |
ES (1) | ES2529426T3 (ru) |
FR (1) | FR2828301B1 (ru) |
GE (1) | GEP20053648B (ru) |
HK (1) | HK1078363A1 (ru) |
HR (1) | HRP20040045A2 (ru) |
HU (1) | HUP0400234A2 (ru) |
IL (1) | IL159955A0 (ru) |
IS (1) | IS7120A (ru) |
MA (1) | MA26122A1 (ru) |
MX (1) | MXPA04000489A (ru) |
NO (1) | NO333768B1 (ru) |
OA (1) | OA12700A (ru) |
PL (1) | PL371096A1 (ru) |
RS (1) | RS50234B (ru) |
TN (1) | TNSN04011A1 (ru) |
UA (1) | UA77187C2 (ru) |
WO (1) | WO2003012571A2 (ru) |
ZA (1) | ZA200400352B (ru) |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2634917A1 (fr) * | 1988-08-01 | 1990-02-02 | Pionchon Philippe | Procede et dispositif de protection d'un logiciel, en particulier contre les copies non autorisees |
US4932054A (en) * | 1988-09-16 | 1990-06-05 | Chou Wayne W | Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware device |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
US5706426A (en) * | 1996-02-07 | 1998-01-06 | United Microelectronics Corporation | Software protection method and apparatus |
US6523119B2 (en) * | 1996-12-04 | 2003-02-18 | Rainbow Technologies, Inc. | Software protection device and method |
WO1999066387A1 (fr) * | 1998-06-12 | 1999-12-23 | Gemplus | Procede de controle de l'execution d'un produit logiciel |
-
2001
- 2001-07-31 FR FR0110244A patent/FR2828301B1/fr not_active Expired - Lifetime
-
2002
- 2002-04-07 UA UA2004010473A patent/UA77187C2/uk unknown
- 2002-07-04 CA CA002455626A patent/CA2455626A1/fr not_active Abandoned
- 2002-07-04 MX MXPA04000489A patent/MXPA04000489A/es not_active Application Discontinuation
- 2002-07-04 OA OA1200400014A patent/OA12700A/en unknown
- 2002-07-04 KR KR1020047000809A patent/KR100881733B1/ko active IP Right Grant
- 2002-07-04 HU HU0400234A patent/HUP0400234A2/hu unknown
- 2002-07-04 RS YU5704A patent/RS50234B/sr unknown
- 2002-07-04 GE GE5414A patent/GEP20053648B/en unknown
- 2002-07-04 WO PCT/FR2002/002343 patent/WO2003012571A2/fr active Application Filing
- 2002-07-04 ES ES02762528.4T patent/ES2529426T3/es not_active Expired - Lifetime
- 2002-07-04 AU AU2002328377A patent/AU2002328377B2/en not_active Expired
- 2002-07-04 EA EA200400058A patent/EA005466B1/ru not_active IP Right Cessation
- 2002-07-04 JP JP2003517690A patent/JP3949104B2/ja not_active Expired - Lifetime
- 2002-07-04 EP EP02762528.4A patent/EP1412838B1/fr not_active Expired - Lifetime
- 2002-07-04 AP APAP/P/2004/002959A patent/AP2055A/en active
- 2002-07-04 BR BR0211373-2A patent/BR0211373A/pt not_active Application Discontinuation
- 2002-07-04 IL IL15995502A patent/IL159955A0/xx unknown
- 2002-07-04 CN CNB028146700A patent/CN100339778C/zh not_active Expired - Lifetime
- 2002-07-04 PL PL02371096A patent/PL371096A1/xx not_active Application Discontinuation
-
2004
- 2004-01-16 ZA ZA2004/00352A patent/ZA200400352B/en unknown
- 2004-01-19 NO NO20040229A patent/NO333768B1/no not_active IP Right Cessation
- 2004-01-19 HR HR20040045A patent/HRP20040045A2/hr not_active Application Discontinuation
- 2004-01-19 MA MA27488A patent/MA26122A1/fr unknown
- 2004-01-19 TN TNP2004000011A patent/TNSN04011A1/fr unknown
- 2004-01-20 CO CO04003757A patent/CO5550507A2/es unknown
- 2004-01-20 IS IS7120A patent/IS7120A/is unknown
- 2004-01-20 EC EC2004004952A patent/ECSP044952A/es unknown
-
2005
- 2005-11-17 HK HK05110298A patent/HK1078363A1/xx not_active IP Right Cessation
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20180191761A1 (en) | Method and apparatus for detecting cyberthreats through correlation analysis | |
JP2009129451A (ja) | 悪性コードによって挿入されたダイナミックリンクライブラリ検出装置及び方法 | |
CY1109554T1 (el) | Μεθοδοι και αντιδραστηρια για την ανιχνευση ενδοτοξινης | |
RU2014148962A (ru) | Система и способ ограничения работы доверенных приложений при наличии подозрительных приложений | |
EP1271283A3 (en) | An intrusion detection method and system | |
WO2001095067A3 (en) | System and method for protecting a networked computer from viruses | |
WO2004113947A3 (en) | Global intelligent remote detection system | |
WO2007002940A3 (en) | Debugging using virtual watchpoints | |
WO2003090050A3 (en) | System and method for detecting malicicous code | |
WO2003014926A3 (en) | Victim selection for deadlock detection | |
EP1657617A3 (en) | A method and apparatus for detecting and protecting a credential card | |
ATE505766T1 (de) | Eindringdetektion während der programmausführung in einem computer | |
EA200400058A1 (ru) | Способ защиты программы от её неавторизованного использования при помощи так называемого принципа детектирования и принуждения | |
US20060167948A1 (en) | Detection of computer system malware | |
KR100680031B1 (ko) | 재밍용 펄스추적 예측게이트를 이용한 레이더 펄스신호의 필터링 방법 | |
KR101982734B1 (ko) | 악성 코드 탐지 장치 및 방법 | |
JPWO2021130897A5 (ja) | 分析装置、分析方法及び分析プログラム | |
DE60118918D1 (de) | Prüfung von fingerabdrücken | |
EA200400057A1 (ru) | Способ защиты программы от её неавторизованного использования при помощи так называемого принципа переменной | |
ATE452360T1 (de) | Verfahren und system zum analysieren und adressieren von alarmen aus netzwerkeindringdetektionssystemen | |
US7891002B2 (en) | Generic method for detecting attack programs hidden in data chains | |
Lindqvist et al. | Analysis of selected computer security intrusions: In search of the vulnerability | |
NZ511211A (en) | Carcass management | |
KR20090080220A (ko) | 유해 프로세스 검출/차단 재발방지 방법 | |
WO2003079164A3 (de) | Vorrichtung zum schutz gegen unauthorisierte benutzung von software |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Lapse of a eurasian patent due to non-payment of renewal fees within the time limit in the following designated state(s) |
Designated state(s): AZ KG MD TJ TM |
|
MM4A | Lapse of a eurasian patent due to non-payment of renewal fees within the time limit in the following designated state(s) |
Designated state(s): AM BY KZ |